Oracle attack

Results: 62



#Item
11Advantage / Tiny Encryption Algorithm / Random oracle / 0K / Chosen-ciphertext attack / Cryptography / Optimal asymmetric encryption padding / Semantic security

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
12Side channel attack / Diffie–Hellman key exchange / Advantage / Public-key cryptography / Semantic security / Cryptography / Cryptographic protocols / Random oracle

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1 Colin Boyd3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 00:49:04
13Relational database management systems / Data / Subroutines / Database management systems / PL/SQL / Stored procedure / User-defined function / Oracle Database / Insert / Data management / SQL / Computing

Esteban Martínez Fayó Advanced SQL Injection in Oracle Databases This presentation shows new ways to attack Oracle Databases. It is focused on SQL injection vulnerabilities and how can be exploited using new techniques

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
14Virtual machines / Programming language implementation / Replication / Hyper-V / Oracle Database / Hypervisor / Operating system / VM / Windows / Software / System software / Cross-platform software

ExecRecorder: VM-Based Full-System Replay for Attack Analysis and System Recovery Daniela A. S. de Oliveira S. Felix Wu Jedidiah R. Crandall

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2007-02-21 19:48:12
15One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
16Oracle machine / Alice and Bob / XTR / Advantage / RSA / Probability space / Cryptography / Cryptographic protocols / Random oracle

Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:50:52
17Chosen-ciphertext attack / Ciphertext indistinguishability / Malleability / RSA / Ciphertext / Chosen-plaintext attack / Random oracle / Cipher / Cramer–Shoup cryptosystem / Cryptography / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 16:37:23
18Public-key cryptography / Communications protocol / Advantage / Peer-to-peer / Side channel attack / Cryptography / Cryptographic protocols / Random oracle

A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wena,b,1 , Libin Wanga,b,2 , Jiaxin Panc,3 a b

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 19:15:30
19Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
20Hashing / Error detection and correction / Hash function / Preimage attack / MD5 / Advantage / Oracle machine / Random oracle / Quadratic probing / Cryptography / Cryptographic hash functions / Search algorithms

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
UPDATE